Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Criminal Education 2: The Cybercrime Ecosystem

Art Gilliland’s focus in this part of the keynote is on the analysis of why enterprises are vulnerable and how the data breach cycle typically takes place. So let’s start by understanding a little bit more about us. Let’s discuss a little bit about how we are seen by the adversary. We are incredibly...

Criminal Education: Preventing Corporate Data Breaches

Art Gilliland, Senior Vice President & General Manager of HP Software Enterprise Security Products, expresses his vision of corporate information security during RSA Conference 2013 keynote speech “Criminal Education”. Thank you very much and good afternoon! My name is Art Gilliland, and...

The Effect of Password Strength Meters 5: Questions & Answers

Blase Ur’s presentation at USENIX ends with a Q&A part which is reflected in this entry and sheds yet more light upon the details related to password meters. Question: I really liked the study and I applaud your large sample size. I’m wondering if you had any way of measuring user tendency to...

The Effect of Password Strength Meters 4: What Makes Meters Matter?

Blase Ur provides herein the results by metrics affecting time of password creation, user sentiment, memorability, and summarizes the study overall. Let’s move on to the password creation process. In particular, I’ll highlight the time it took the participants to create a password, and also how...

The Effect of Password Strength Meters 3: Password Composition and Guessability

In this entry Blase Ur walks us through the first two metrics for the study, namely the relation of password length and meter type, and results by guessability. Before I jump into our results, I’ll tell you a little bit about our participants. We had 2,931 of them recruited on Amazon’s Mechanical Turk...

The Effect of Password Strength Meters 2: Visual and Scoring Differences

Blase Ur proceeds with describing the workflow of the password meters study, highlighting here the impact of visual and scoring elements upon password strength. So, I just showed you a number of different features, and we, of course, wanted to know what each of these features is contributing. All of our...

The Effect of Password Strength Meters

During his USENIX talk “How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation” Blase Ur, computer security and privacy researcher with Carnegie Mellon University, presents a thorough study of password strength meters in terms of their effect on password creation...

Hacker’s Guide to Stay out of Jail 8: Questions and Answers

This is the final part of the Grugq’s presentation at HITB SEC event, where he takes questions from the audience about OPSEC for online freedom fighters. The Grugq: So, are there any questions? Question: What’s, in your estimation, the average cost per persona? Answer: In terms of time, you probably want...

Hacker’s Guide to Stay out of Jail 7: VPNs vs. TOR

The Grugq dwells here on the issues of anonymity and privacy for freedom fighters, paying a particular attention to the tools for maintaining those. In terms of technologies that you can use to help ensure that you maintain good OPSEC, on the subject of VPN vs. TOR, a lot of people seem to have thought that...

Hacker’s Guide to Stay out of Jail 6: Anti-Profiling

Further explicating OPSEC guidelines for freedom fighters at HITB SEC Conference, The Grugq now focuses on the various ways to prevent personal profiling. In terms of staying anonymous, briefly, if we go over some guidelines, you want to avoid revealing personal information about yourself. Any personal...